Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
b58f3f165a8728215d4f6a7fae2d1ea5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b58f3f165a8728215d4f6a7fae2d1ea5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b58f3f165a8728215d4f6a7fae2d1ea5_JaffaCakes118.html
-
Size
20KB
-
MD5
b58f3f165a8728215d4f6a7fae2d1ea5
-
SHA1
f6afe94598cdbd74754b4da539418647cbd09adc
-
SHA256
d6e20af6b8d79bc15833d813c0e3e68f417d03b4e242fe532492e39feeb731c5
-
SHA512
0b1e99bad0d507f5c43c88f01ef2ac584dcbdc9dc3841442ef7163816e1be5281e5efc56099dfe5088d95a89946c752223a49e280f3173588003627fc4e3fe07
-
SSDEEP
192:b7ol7vFZ7v/RtIF9TsVi7NaNe0sgf9mTisrWfqSDO/U9Wfghu/YWfSamWfp+HsZZ:nmfhtm9lvigSDy4uMagWNAFM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430446672" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000033b16354dc6f938d4c618c43640033d94bed24d32a06985cd16ff67afe151fa5000000000e80000000020000200000000c4886e53e0a3a5ec2c2b49b74d38310abea0c45031ada4557f5b1699f72ad1190000000adea62034be452f16e3d8739b2a46b3f39d82c27c1a440ab7df2b1e880ab658f889f91c6cf9a6e2cccbf4d672984197e3391a71734c436e324ca1ba7befbf79e4b5fc02315be8f3d2973ad0bf9d1c1f4b012b156f4c8b252dbfd8523accfb73a1cdd325b08b6d042a0ca5c46b1ba544bea789aea70b8c65e9c9ba1852fd281bc003176ed263b38be60848917235c22e7400000006077e35321438ce591e0799c1821ebb6e6bed0b1897fc2fe6df49bc3f92ea807c16f163ad430047856a48ef40ae3d4b01978ef5fe5da2a02e03959fed5f9cb53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C00E101-6019-11EF-BBF7-D6EBA8958965} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000004bf81c27d226a4dd5c0a8f1a271a639b01b135fbbb225ee9d2258dc927d1e61c000000000e80000000020000200000006e86483f131bf404f094bbcb235d228f7fc73becbe2420b7dee2626d7d133712200000005df0f0cb4e22f2d3d87d4bcac1b55a72c72c5be86f1cda62f3c8282c40aa6a394000000024fac1a836091d41d5b0bcf28afde02870ac6115ba301818c9183f62a02d1b91a2f7c7838fc0daeeabce29cd2479a89e6207773a7199b8dfbad05bca4ee4623e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b2205226f4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1840 iexplore.exe 1840 iexplore.exe 476 IEXPLORE.EXE 476 IEXPLORE.EXE 476 IEXPLORE.EXE 476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1840 wrote to memory of 476 1840 iexplore.exe 31 PID 1840 wrote to memory of 476 1840 iexplore.exe 31 PID 1840 wrote to memory of 476 1840 iexplore.exe 31 PID 1840 wrote to memory of 476 1840 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b58f3f165a8728215d4f6a7fae2d1ea5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3668ded3b4dc150153320a8f6127eeb
SHA15ab945450895825e0e7c0eebb3a5adc49c73e5f8
SHA256aea9e4336b2652c1150d991a7e9c3cde87ccc1628748d28640501f234cd0fb99
SHA51249b13743197ed6e11d098d0200f4828debc9493832db730d13f1ba0e1aee0b64937c137f4ba135d670016c9f8191d0c647074ddb4705c43966dc22b4978d7d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a930a340d1d4ad96ffd7d80c7ba68d12
SHA1737ca04c8472c17c48fefd259ee6789aab126b49
SHA2564f44f94d6f9fc8823283c198762c9b4ef531ba6aee1540390ed1aa8bef36c977
SHA512d79173f74ef900dc4f13e3b05a920c932c29cd7921a0e47ebeb658653e086c08f9c06918b2416a164c41c052f3d8d062d3bb24b9bb893d3e7886eda0ba62405e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d02a0770f52eef15df20c4521fc4e4a4
SHA1428ec1acb3951fa438c4c2373699f2a4ebca51b2
SHA2569686cc4fb17a37ce3a1c6a0cb1b8b655921ae4700eb2de65e8c6999bf496aed2
SHA512ae1c81eb4b06ba037cd4a5e239331bcdf19197cd62a662026f78d66f18ddb864b0f18ed717620399e724d17bf5e7e0dd03eba21baf5b73a77ba30364e5c0221c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb1d1ec03d5c922fb3827ff43b2e4b95
SHA1c58702c18d9c062ae77ca580fac4f2fc2e800a0c
SHA2564a2dc556239cd91e7a8b34e0abb94827bd4f316f13b6926276e00965bf6adbbe
SHA5121ecc5cbd8297ee72e94ccc3c689fd4f0ec3db9ede9b37ed7b973f3f3eebef860d3f94254dbeede9583caeb1ecb770d835cd70712a78882dd27030733246b0eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD554f3f46da3e02b8cf1b193a5e78cd313
SHA118ee0540f8644e05e95007718ebc53b9e515be3a
SHA256261d114fbde7842de2cd334e59f3cdd430bc87000f41e563f7fec495f87c5f95
SHA5129283977e779edea602e22a33f8a409856cfecb5a956b44f83bab61e30ae987c4e5d710be80941e181592aa78690d9bd22f6bd4b3387649a37f717d3aaa5837ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50dc40fa8c684a1478399bb2f343aa11e
SHA101a0332e0b3e1f8f432a5209f016bfd897bccd4f
SHA2567890de8275145da30e75ba2c88a199bd724c42e18c10fe00c6460a345104b3c5
SHA5128a4abfc26348c7cd87ee752317a9d454d612d1d998e17e433debae3f3f6c28db855378248f0c412a948a3fcee9c7675fe017efb8681b15d3077535f12a281aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55541937cd376dee4c196aad0a05a9e54
SHA1dcd33779fd0b846ea4bc65d8bf2e9f4211e98ad4
SHA256e4636f9fbdb4564fb5e85bbf9a3f970adb3a6f499d4c2b78a34924cab4c4cb5a
SHA512fa16bed08b3c8d348840dfedd221ad9d812200950a8f70aeb487d4f117447cf7bb12171e55860dd65f96492f92c49a7743639e5d98a76499fb89a2fc7c618f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a12316d3183b475c3188c70b64bcf89
SHA1c3c605a1d3cbfa34430871a9cc9cd080250a959c
SHA25666656b5113dd291d90b411f2f7402a24bac59d595665680ad0bf48df8edc3144
SHA512644390c23aa266490077354ea1732ef460fc5a410ad650955490d644b7b5b98ec1f2d62a43603809c5e88c0a3608b69ea9a3d0f99ed9d7468c17e6c3f0aec74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e2d2de40de2a08170c4e024773f8e2f
SHA1f7c1d653fb4b79c28d5028041cb95060afc93a70
SHA25698fb7882c7537da0ad2bf5d971967d8534b5301951b8a77be3d7348630b6e624
SHA512c443841340315d842f4b244cb5db4a925e6d134d919ef9d47d53fde130a5a71fcabc09f6a3a2bdf0207d29dcc052b4796acf07785f09496e7f23248b12f95b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58da92bc257613d5bb08bfb199a109c96
SHA1a80d845d6a8b235386ae85c968c97e2908f35bac
SHA2569b79e90f1a68e59bd35b998a79ea67b55c97d8f60e18546fc25b58ef2a10664a
SHA51247bbd537dcd299c5fa0b1e7288a5f742c969f187618bd5a5db0de580e5225161fdc7fd7971532b2d22b71e6a2ebfec612667ef1949dd7eade84dd0dc1c65884e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c952b3a5749d503e260795b6a6899231
SHA12125aa221378cabb8fbda929039c984e073b3318
SHA256930a2ba6332a1eabfdf1e03a1001597bab4664a1d12dbd01df4d66dedf4c2c4c
SHA5125d56610123c98173e90b77ad109d3ab1547b1445fafc2ac76a65a5a931e361f432ae6488e7869c127fd8c6c8080dd760f4ce3ebc3e77471e49042353f37a98b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59aa01a64937a0acabbe600c703acba0f
SHA1a9f3bf39c6e0da0c55d734debee6e4a53f72b17f
SHA256e09ad392c6284f301d75a53ebf27ec662c297845b4a2e65f9f407450c6b22ebf
SHA51242384373a3b1dd34b1c8d21e5ba7a96bd15a293f5900572e95e85749420400d66bac88f1c8eeeea864907c31a2d60ab4bf84829957211bff22daf72ac0b583bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5ea756b38d49c06917b22f6b307567e
SHA1f86a0b7d11615f1d3286307f57a12292983d41d3
SHA25634a70b6aa0e98ddf0380e3f349d5613c71ab6a1478332dd624ff38ae3ef3d057
SHA5120173e355192846885de78ccb49cd2a9dd2d95abd44a38068194b9283c6abe236a485a7e5387fa88405bc1d8a05b4921274b08f24cefa70ff83f0d49916d277be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59154322e78b5325bbc777e5b566f40e8
SHA16bd372b927499a5a2ad68fbe9ef668127939ea28
SHA25679e7f22430671ab03a999b3f39ec97efafcb980ebc5134b8fa86d13497382b6c
SHA512360a672b196a12ec7c0b25b8584fdf0de036a063158bf9f280799aec9d4c0177657bfb6b0645f7f11a3f8d59af821598f555b471fe4bafd0152654c0cb6f8014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5756daf5f6b7079bb9ed728f138857302
SHA19d713f04cfc9af1535980e6da00b51d07a498716
SHA2569ae864d4745d16d18cd3d6d1ce4dc52743180983c3015c036ba8ebcb563a9fdb
SHA512aafb9bde9c8d1dc16cc10b66f349c8807ad6d91c604427727f6c534e1344ee4c8411066f2f4a7f9846e46406a33f710f0550388f7d47fabe118e80f6b6e388ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53442511829c73159ad39931f2c4fe548
SHA1c8c7f91c3da9defcebee49da351fedc5cab3a55e
SHA256b67649db04c332c3229b2d848fd1bd807f132f67cffc646e9ec2ba16169387c8
SHA512f8c1ec5ec532c78d1dba92cb6795ba61b85190549997849443fde6a659482509390a8ea794abc6b2095bba4296be560558b661d1433462597d3a11099a4deff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5a58c76426e4c81dc23cd30d287761d
SHA1c3c7f2a95dfc460da90deb8d7e8201db86cba2b7
SHA25630695cc911b842faf420966f05631552abbbd1cad817c1792f6bcc3179eeaf20
SHA5123b9d03f87c543191ed7d3da576bf6883e020c08bb08e1ff5a723a517e6077fa3c344f8c05adb6062dadd2592b488a4e96439e42cd3e7a1fd5633fcc8267aff26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6b644b91e09f7b70035414bb826a492
SHA1c6b0e52063a7dee97f45002e512a77526e529207
SHA256eed91bdd05fbff16d6fe7f183c23ce4db0e57d2be7ee2d0d1c9fe05e9e72d54d
SHA5120f48c3769e34c62193a0bb333c914a7e2ad27f73cab17b3cbf25242f74af4eb294bb1ad0827347750e484b569f9a739667842f4b3a30c45b4cf475d9146d4642
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b